General

  • Target

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

  • Size

    11.7MB

  • Sample

    241221-ed5mtasjhv

  • MD5

    b115a4683b00adc3fc396317620764e8

  • SHA1

    8073de2e9565611fcfe3a974117e8f5fa5cda050

  • SHA256

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

  • SHA512

    a00217408f08d20568a8b5af24314ca4ee2133cc8a8dfa24fade4dbbc38becf00290068d1fbf68d57a1b062fcd8d4ebf931a34f0f370536701283a7a1f7f8e7b

  • SSDEEP

    196608:WT1QEHf6YthDVlDAJpFQoiiuCQqNObM57fyCZ2HO/aFOe382SHtmfU7:k1QE/6YJupioB+oiMpf/gPOePSNwy

Malware Config

Targets

    • Target

      eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

    • Size

      11.7MB

    • MD5

      b115a4683b00adc3fc396317620764e8

    • SHA1

      8073de2e9565611fcfe3a974117e8f5fa5cda050

    • SHA256

      eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

    • SHA512

      a00217408f08d20568a8b5af24314ca4ee2133cc8a8dfa24fade4dbbc38becf00290068d1fbf68d57a1b062fcd8d4ebf931a34f0f370536701283a7a1f7f8e7b

    • SSDEEP

      196608:WT1QEHf6YthDVlDAJpFQoiiuCQqNObM57fyCZ2HO/aFOe382SHtmfU7:k1QE/6YJupioB+oiMpf/gPOePSNwy

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • A potential corporate email address has been identified in the URL: png@3x

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks